Upload
oracletrainings
View
139
Download
0
Embed Size (px)
Citation preview
www.oracletrainings.com
Oracle Data Vault At Oracle Trainings
Email : [email protected] Contact : +91 8121 020 111
www.oracletrainings.com
Oracle Data Vault Course Content:Database Vault Overview• Overview of Database Vault elements & functionality• Component relationships• Database Vault effects & examples• Database Vault Administrator• Reporting & monitoring• Database Vault API• Manage the Database Vault database using Enterprise Manager
Configuring Database Vault• Enabling Oracle Database Vault• Configure the Oracle database for Database Vault• Database parameters altered during configuration• Login into DVA• roles of Database• Database Vault account• Database Vault schemas
www.oracletrainings.com
Configuring Realms• Realms: Concepts• Creating & editing realms• Deleting realms• The realm algorithm• Examples of realms• Delivered realms• Realm views• Monitoring & reporting of realms
Defining Rule Sets• Rule sets: Concepts• Creating & editing rule sets• Rule sets Deleting• Rules Reusing rules• Auditing rule sets• Custom event handlers• Using rule sets with realms• Rule set examples
www.oracletrainings.com
Configuring Command Rules• Command Rules: Concepts• Creating & editing command Rules• Delivered command rules• view of DBA_DV_COMMAND_RULE• Command rule report• Command rule API
Extending Rule Sets• Factors: Concepts• Factor scenarios• Creating & editing factors• Managing factors• Identities: Concepts• Purpose of identities• Identity Creating• Identities Managing
www.oracletrainings.com
Configuring Secure Application Roles• Secure application roles: Concepts• Creating & editing secure application roles• Deleting secure application roles• Secure application roles: Examples• Managing secure application roles
Database Vault Reports Viewing• Monitoring Database Vault• Configuration reports• Reports of Auditing• Reports of Security• Object privilege report• Accounts & roles reports• Privilege summary reports• System privileges reports
www.oracletrainings.com
Implementing Best Practices• Identifying your security requirements• Suggested naming convention• Duty best practices Separation• Identifying your security requirements• Audit all violations• Connection pooling considerations• Enforce the connections from an application server• Performance considerations
www.oracletrainings.com
Please Like Us OnFacebook : https://www.facebook.com/oracleonlinetrainingLinkedIn : https://www.linkedin.com/in/oracletrainingsTwitter : https://twitter.com/oracletrainigs
www.oracletrainings.com